GCN Tech Blog

By GCN Staff

Blog archive

Return of the Chinese menace

Did malicious Chinese hackers break into Congressional computers to figure out what lawmakers knew of China's human rights violations? Two House members, Rep. Christopher H. Smith of (R-N.J.) and Rep. Frank R. Wolf (R-Va.) have made this charge, though Chinese officials deny the allegations.

We've covered the Chinese threat before, especially as it pertains to Defense networks.

As always, one thing we'd like to see more of in these charges is stronger evidence. After all, any script kiddie with port scanning software can "attack" a public-facing military network. And someone anywhere in the world can hijack a unsecured computer on the network to launch their own evil-doings. Names please, not IP numbers.

Posted by Joab Jackson on Jun 12, 2008 at 9:39 AM


Featured

  • Comment
    customer experience (garagestock/Shutterstock.com)

    Leveraging the TMF to improve customer experience

    Focusing on customer experience as part of the Technology Modernization Fund investment strategy will enable agencies to improve service and build trust in government.

  • FCW Perspectives
    zero trust network

    Why zero trust is having a moment

    Improved technologies and growing threats have agencies actively pursuing dynamic and context-driven security.

Stay Connected